EP2523486A1 - Key authentication method for binary cdma - Google Patents

Key authentication method for binary cdma Download PDF

Info

Publication number
EP2523486A1
EP2523486A1 EP10841076A EP10841076A EP2523486A1 EP 2523486 A1 EP2523486 A1 EP 2523486A1 EP 10841076 A EP10841076 A EP 10841076A EP 10841076 A EP10841076 A EP 10841076A EP 2523486 A1 EP2523486 A1 EP 2523486A1
Authority
EP
European Patent Office
Prior art keywords
authentication
key
random number
user
bvlr
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP10841076A
Other languages
German (de)
French (fr)
Inventor
Jang Yeon Lee
Okyeon Yi
Jinwoong Cho
Hyun Seok Lee
Ju Sung Kang
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Korea Electronics Technology Institute
Original Assignee
Korea Electronics Technology Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Korea Electronics Technology Institute filed Critical Korea Electronics Technology Institute
Publication of EP2523486A1 publication Critical patent/EP2523486A1/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Definitions

  • the following description relates to secure key authentication methods for binary CDMA network and, more particularly, to methods for key authentication between UE and SN and key re-authentication for handover in the binary CDMA network.
  • Binary CDMA technology is designed to resolve frequency allocation problem in accordance with the coexistence of various wireless technologies such as WLAN, Bluetooth and QoS related problem.
  • Koinonia system based on the binary CDMA technology and approved as international standard by ISO/IEC JTCSC6 in January, 2009, has interoperability with various prior technologies, provides QoS under noisy wireless environment, and does not interfere existing communication system.
  • Guardian technology applied with wireless encryption technology, is under development based on the binary CDMA technology. Accordingly, various research projects for adapting the guardian technology to various wireless communication systems are actively in progress.
  • a system may comprise at least one user terminal for storing master key for authentication, a serving network that comprises wireless access point(RAP) and visitor location register unit(VLR), and home network that comprises an authentication server and home location register unit(HLR).
  • RAP wireless access point
  • VLR visitor location register unit
  • HLR home location register unit
  • the key authentication method at the user terminal may comprise steps of receiving terminal authentication request message from wireless access point, transmitting terminal authentication response message that comprises identification information for the user terminal, receiving user authentication request message that comprises at least two random numbers and code information for message authentication from the wireless access point, and transmitting user authentication response message that comprises the first information that is generated using master key.
  • the key authentication method at the serving network may comprise steps of receiving terminal authentication response message that comprises identification information for user terminal from the user terminal that transmits terminal authentication request message, transmitting authentication data request message that comprises said identification information to the home network, receiving authentication data response message that comprises the first random number, a temporal key and the first information from the home network, and transmitting user authentication request message that comprises the first random number, the second random number and code information for message authentication to the user terminal.
  • FIG. 1 briefly illustrates an example of the Koinonia system.
  • the Koinonia system has physical layer and data link layer.
  • the data link layer has media access(MAC) sub-layer and adaptation sub-layer.
  • the media access sub-layer may use Hybird multiple access(HMA) mode that performs media access through the combination of code and time slot based on the characteristics of bynary CDMA of the physical layer.
  • the binary CDMA has a structure that binarizes modulated signals of various level, generated according to multiple-code CDMA, and transmits as TDMA signals.
  • the binary CDMA has both merits of CDMA that is robust against noise and TDMA that consumes less power and has high speed transmission capacity.
  • the adaptation sub-layer interconnects between lower protocol stacks and higher protocol stacks of other wireless standards.
  • the Koinonia system ensures QoS in noisy wireless environment, provides interoperability by combining various digital devices into one network (Koinonia network), and provides characteristic of interference-free to other communication systems when the Koinonia system and the other systems coexist.
  • the Koinonia system overcomes the problems of prior short range wireless communication technologies such as Bluetooth, IEEE 802.11b by finding solutions to interference problem in complex wireless environment and power consumption problem.
  • Table 1 shows the characteristics of various short range wireless communication technologies.
  • Koinonia Bluetooth IEEE 802.11b UWB Service range 10 ⁇ 100m 10 ⁇ 100m 10 ⁇ 100m 1 ⁇ 10m QoS ⁇ ⁇ X ⁇ Module Binary CDMA FHSS : GFSK DSSS : QPSK/CCK CDMA : PSK DFDM : QPSK Network Topology Ad-hoc/ Infra Ad-hoc Ad-hoc/ Infra Ad-hoc/ Infra Leading country of International Standard Korea Japan U.S.A U.S.A
  • FIG. 2 illustrates a structure of BLAN (Binary CDMA LAN).
  • the BLAN has a wire-and-wireless structure and comprises UE (user equipment), SN (serving network), and HE (home environment, home network (HN)).
  • UE and SN are interconnected with each other through wireless network.
  • SN and HE are interconnected with each other through wired network.
  • BSIM Breast CDMA Subscriber Identity Module
  • ME Mobile Equipment
  • BSIM owned by each user, is a device for identifying and authenticating subscribers. That is, BSIM has encryption algorithm for user authentication and service profile of subscriber, and performs similar functions to 3G USIM (Universal Subscriber Identity Module).
  • ME is a device that provides an interface for all physical connections in wireless connections and an interface for interaction with BSIM.
  • SN a service provider for providing various services to users, has RAP (Radio Access Point) and BVLR (BLAN Visitor Location Register).
  • RAP Radio Access Point
  • BVLR BLAN Visitor Location Register
  • RAP an access device for connecting a user to a network, provides wireless interface to ME using binary CDMA.
  • BVLR manages RAPs in its own area, and provides authentication services to users through interaction with HE.
  • BVLR may enhance overall network security by minimizing direct exposure of important confidential information such as user information, authentication information through preventing direct authentication of RAP that is exposed to relatively more physical security threats. Moreover, BVLR performs substantive authentication process, enables re-authentication protocol in accordance with handover, and provides high mobility by efficiently managing handover between RAPs in the same BVLR. BVLR is also adaptive in adding partial small networks. A network that includes one BVLR and necessary number of RAPs may be easily added to particular area and may be managed by different security level in comparison with connected network.
  • HE has private information and authority information of user and supports BLAN-AKA(Authentication and Key Agreement) mechanism.
  • HE has BHLR (BLAN Home Location Register) and authentication server (AuC).
  • BHLR a database for managing users, maintains subscribers profile and related information, and information relates to BVLR.
  • AuC stores data that is required for authentication of each user, encryption and integrity, stores functions for generating master key (MK) that is distributed to each user and required other keys, and generates data that is required for authentication when a user requests authentication.
  • MK master key
  • BLAN is a network that wired and wireless networks coexist.
  • wireless communication part between UE and SN is essential.
  • communication part between SN and HE is not substantially different from prior wired network, and communication part between RAP and BVLR in SN may be merely considered as extension of the communication part between SN and HE. Therefore, it may be presumed that safe channels are established in wired communication part of BLAN and safety of mutual authentication and all communication is ensured among each entity in wired communication part of BLAN.
  • the object of the mutual authentication may be the SN that is authorized authentication from US and HE.
  • Communication network between UE and SN is the object of mutual authentication.
  • the authentication is performed through message exchanges between a user and a network. After the authentication the user may trust to the connected network.
  • Secrecy may be divided into 2 types, one is user secrecy and the other is user-data secrecy.
  • the user secrecy which uses temporal identification information instead of ID of the user is used for the protection of user location information and user related private information.
  • the user-data secrecy is used for the protection of the data between UE and RAP.
  • the user-data secrecy may be implemented by using block encryption algorithm after success completion of authentication (using authentication protocol).
  • Integrity is required to authenticate origin and content of a message. To investigate whether unintended or intended changes of message content exist, integrity check algorithm is implemented by using Message Authentication Code (MAC) algorithm.
  • MAC Message Authentication Code
  • Handover is performed for the continuity of service is wireless network.
  • BLAN performs handover when an UE is moving from one RAP to another RAP. More frequent handovers might be expected than any other wireless network.
  • re-authentication protocol For supporting frequent handovers, it is better to define a new authentication protocol, re-authentication protocol, which is different from AKA protocol.
  • FIG. 3 illustrates two exemplary of handovers.
  • Intra-BVLR handover is handover performed in one BVLR. That is, Intra-BVLR handover is the handover that is performed when UE is moving among RAPs of one BVLR. According to FIG. 3 , the Intra-BVLR handover takes place when an UE is moving from RAP#1-1 to RAP#1-2 or from RAP#1-2 to RAP#1-1 (RAP#1-1 and RAP#1-2 are connected to the same BVLR#1).
  • Inter-BVLR handover means the handover between RAPs that is connected to different BVLR.
  • authentication to a new BVLR is required.
  • acquisition of information that is required for authentication from prior BVLR or new AKA process using BHLR are required.
  • a new secure channel is required.
  • the new channel may used only when handover takes place.
  • the latter authentication method that uses existing channel between BVLR. and BHLR is preferred.
  • the Inter-BVLR handover (BVLR changing handover)
  • TABLE 2 shows characteristics of two handovers.
  • Intra-BVLR handover Inter-BVLR handover Definition Movement among different RAPs in one BVLR Movement among RAPs that are connected different BVLR Possibility of taking place of handover High Low Authentication Protocol Re-authentication protocol BLAN-AKA Key update TK : not necessary TK : necessary SK : necessary SK : necessary
  • FIG. 4 illustrates structure of authentication protocol keys.
  • the keys used in authentication protocol may be categorized into 3 types, MK, TK, SK. MK (master key), a secret key that BHLR and BSIM share beforehand, is a secret value for mutual authentication between a user and a network. This secret value is not disclosed to medium entities such as BVLR, RAP and ME.
  • TK temporary key
  • TK temporary key
  • TK temporary key originated from MK, is used to re-authentication in handover, etc.
  • TK is generated by BHLR and transmitted to BVLR in AKA process.
  • TK is a secret key that BSIM and BVLR share.
  • SK session key
  • SK session key
  • a product of success authentication is a key that is used to protect all traffics of wireless communication that uses binary CDMA.
  • AKA is a process for performing mutual authentication and key confirmation between a user and a network.
  • AKA process should be performed for ensuring integrity and security of traffics.
  • FIG. 5 is a diagram which briefly shows BLAN-AKA process.
  • BVLR and UE After successful completion of BLAN-AKA, BVLR and UE respectively stores TK and ANonce that are shared during AKA process for potential re-authentication. BVLR notifies successful completion of AKA process to BHLR, and then BHLR updates the counter.
  • Re-authentication may reduce overhead so as to enable quick handover.
  • Re-authentication may be performed using secret value that is shared by BSIM and BVLR.
  • TK in BLAN-AKA protocol is one example of the secret value.
  • TK may be updated through AKA process, authentication may be performed using TK when a handover between RAPs of one BVLR takes place.
  • FIG. 7 illustrates re-authentication process when intra-BVLR handover takes place when RAP#1-1 and RAP#1-2 are connected to the same BVLR, BVLR#1 and UE moeves from RAP41-1 to RAP#1-2.
  • Alike AKA process RAP receives SK' from BVLR and relays communications between UE and BVLR.
  • ANonce is used instead of VNonce and ANonce' instead of ANonce. More specifically, Nonce used in the key confirmation process in AKA process is used to key derivation in later re-authentication. After the completion of re-authentication, ANonce' will be used to generate a new session key in next re-authentication.
  • UE and BVLR should update their own ANonce to ANonce' respectively after the completion of re-authentication.
  • the number of message transmission counted after UE starts to transmit PID or TID is 12, because BLAN-AKA process further notifies the completion of authentication to BHLR after the completion of authentication.
  • the obvious reductions of message transmission number and calculation number in re-authentication protocol are due to the characteristic of re-authentication protocol that exclusion of BHLR and simultaneous performance of authentication and key exchange. In re-authentication, key confirmation process is unnecessary because the session key SK' is proven through authentication.
  • BLAN performs authentication that is similar to user authentication by using BSIM that is similar to USIM. This means the enhancement of terminal usage efficiency, and strong protection of individual privacy.
  • BLAN re-authentication protocol In BLAN re-authentication protocol, BSIM and BVLR may generate session key SK' that will be used in next re-authentication in advance by using ANonce and TK that are used in former authentication. Therefore, BLAN re-authentication protocol supports faster authentication and BLAN using BLAN re-authentication protocol may efficiently handle frequent handovers.
  • BLAN-AKA process the possibility of resynchronization is very low, because BHLR transmits only one authentication data according to the requests of BVLRs that are located in proximity to each other and BSIM and BHLR perform updates only after the completion of successful BLAN-AKA process.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A key authentication method between UE and SN for binary CDMA network and a key re-authentication method during UE performs handover within the same SN in binary CDMA network are provided.
The key authentication method for the user terminal may comprise steps of receiving terminal authentication request message from wireless access point, transmitting terminal authentication response message that comprises identification information for the user terminal, receiving user authentication request message that comprises at least two random numbers and code information for message authentication from the wireless access point, and transmitting user authentication response message that comprises a first information that is generated using master key.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application claims, the benefit under 35 U.S.C. § 119(a) of a Korean Patent Application No. 10-2010-0000176 filed with the Korean Intellectual Property Office on January 4, 2010, the entire disclosure of which is incorporated herein by reference for all purposes.
  • FIELD OF THE INVENTION
  • The following description relates to secure key authentication methods for binary CDMA network and, more particularly, to methods for key authentication between UE and SN and key re-authentication for handover in the binary CDMA network.
  • BACKGROUND
  • Binary CDMA technology is designed to resolve frequency allocation problem in accordance with the coexistence of various wireless technologies such as WLAN, Bluetooth and QoS related problem. Also, Koinonia system, based on the binary CDMA technology and approved as international standard by ISO/IEC JTCSC6 in January, 2009, has interoperability with various prior technologies, provides QoS under noisy wireless environment, and does not interfere existing communication system. Recently, Guardian technology, applied with wireless encryption technology, is under development based on the binary CDMA technology. Accordingly, various research projects for adapting the guardian technology to various wireless communication systems are actively in progress.
  • However, various security threats are increasing in wireless environment. As a result, many damages take place such as private and public information leakage or serious system damage. Although security-enhanced IEEE 802.11 is recommended for IEEE 802.11 WLAN which is broadly used in recent times, it does not provide expected security due to cost or management problem. Consequently, public network or some organizations usage of limited and embedded secure functions is increasing continuously.
  • Moreover, it is obligatory to apply encryption technology for security product introduced to public organization in public network construction. Therefore, it is still inappropriate for public network to apply IEEE.11i WLAN using advanced encryption standard.
  • BRIEF DESCRIPTION OF THE DRAWINGS
    • Fig. 1 is a diagram briefly illustrating the Koinonia system.
    • Fig. 2 illustrates a structure of BLAN(Binary CDMA LAN).
    • Fig. 3 is an illustration which shows two exemplary of handover.
    • Fig. 4 illustrates an authentication protocol key structure.
    • Fig. 5 is a flow which shows BLAN-AKA process.
    • Fig. 6 is a flow which shows key authentication process of BLAN-AKA,
    • Fig. 7 illustrates re-authentication process for intra-BVLR handover that UE moves from RAP#1-1 to RAP#1-2 when RAP#1-1 and RAP#1-2 hold connection with same BVLR#1.
    SUMMARY OF THE INVENTION
  • In one general aspect, provided is key authentication methods between UE and SN for binary CDMA network.
  • In the key authentication method, a system may comprise at least one user terminal for storing master key for authentication, a serving network that comprises wireless access point(RAP) and visitor location register unit(VLR), and home network that comprises an authentication server and home location register unit(HLR).
  • The key authentication method at the user terminal may comprise steps of receiving terminal authentication request message from wireless access point, transmitting terminal authentication response message that comprises identification information for the user terminal, receiving user authentication request message that comprises at least two random numbers and code information for message authentication from the wireless access point, and transmitting user authentication response message that comprises the first information that is generated using master key.
  • The key authentication method at the serving network may comprise steps of receiving terminal authentication response message that comprises identification information for user terminal from the user terminal that transmits terminal authentication request message, transmitting authentication data request message that comprises said identification information to the home network, receiving authentication data response message that comprises the first random number, a temporal key and the first information from the home network, and transmitting user authentication request message that comprises the first random number, the second random number and code information for message authentication to the user terminal.
  • In another aspect, provided is key re-authentication methods when UE performs handover within same SN in binary CDMA network.
    In another aspect, provided is user authentication using BSIM, re-authentication protocol using BVLR for better mobility support.
  • Other features and aspects will be apparent from the following detailed description, the drawings, and the claims.
  • DETAILED DESCRIPTION
  • The following detailed description is provided to assist the reader in gaining a comprehensive understanding of the methods, apparatuses, and/or systems described herein. Accordingly, various changes, modifications, and equivalents of the methods, apparatuses, and/or systems described herein will be suggested to those of ordinary skill in the art. Also, descriptions of well-known functions and constructions may be omitted for increased clarity and conciseness. Changes, modifications, and equivalents of the methods, and/or systems described herein will be suggested to those of ordinary skill in the art. Also, descriptions of well-known functions and constructions may be omitted for increased clarity and conciseness.
  • FIG. 1 briefly illustrates an example of the Koinonia system. The Koinonia system has physical layer and data link layer. The data link layer has media access(MAC) sub-layer and adaptation sub-layer. The media access sub-layer may use Hybird multiple access(HMA) mode that performs media access through the combination of code and time slot based on the characteristics of bynary CDMA of the physical layer. The binary CDMA has a structure that binarizes modulated signals of various level, generated according to multiple-code CDMA, and transmits as TDMA signals. The binary CDMA has both merits of CDMA that is robust against noise and TDMA that consumes less power and has high speed transmission capacity. The adaptation sub-layer interconnects between lower protocol stacks and higher protocol stacks of other wireless standards.
  • The Koinonia system ensures QoS in noisy wireless environment, provides interoperability by combining various digital devices into one network (Koinonia network), and provides characteristic of interference-free to other communication systems when the Koinonia system and the other systems coexist. Especially, the Koinonia system overcomes the problems of prior short range wireless communication technologies such as Bluetooth, IEEE 802.11b by finding solutions to interference problem in complex wireless environment and power consumption problem.
  • Table 1 shows the characteristics of various short range wireless communication technologies. TABLE 1
    Koinonia Bluetooth IEEE 802.11b UWB
    Service range 10∼100m 10∼100m 10∼100m 1∼10m
    QoS Δ X Δ
    Module Binary CDMA FHSS : GFSK DSSS : QPSK/CCK CDMA : PSK DFDM : QPSK
    Network Topology Ad-hoc/ Infra Ad-hoc Ad-hoc/ Infra Ad-hoc/ Infra
    Leading country of International Standard Korea Japan U.S.A U.S.A
  • FIG. 2 illustrates a structure of BLAN (Binary CDMA LAN). The BLAN has a wire-and-wireless structure and comprises UE (user equipment), SN (serving network), and HE (home environment, home network (HN)). UE and SN are interconnected with each other through wireless network. SN and HE are interconnected with each other through wired network.
  • UE, user area of BLAN, has BSIM (Binary CDMA Subscriber Identity Module) and ME (Mobile Equipment). BSIM, owned by each user, is a device for identifying and authenticating subscribers. That is, BSIM has encryption algorithm for user authentication and service profile of subscriber, and performs similar functions to 3G USIM (Universal Subscriber Identity Module). ME is a device that provides an interface for all physical connections in wireless connections and an interface for interaction with BSIM.
  • SN, a service provider for providing various services to users, has RAP (Radio Access Point) and BVLR (BLAN Visitor Location Register). RAP, an access device for connecting a user to a network, provides wireless interface to ME using binary CDMA. BVLR manages RAPs in its own area, and provides authentication services to users through interaction with HE.
  • BVLR may enhance overall network security by minimizing direct exposure of important confidential information such as user information, authentication information through preventing direct authentication of RAP that is exposed to relatively more physical security threats. Moreover, BVLR performs substantive authentication process, enables re-authentication protocol in accordance with handover, and provides high mobility by efficiently managing handover between RAPs in the same BVLR. BVLR is also adaptive in adding partial small networks. A network that includes one BVLR and necessary number of RAPs may be easily added to particular area and may be managed by different security level in comparison with connected network.
  • HE has private information and authority information of user and supports BLAN-AKA(Authentication and Key Agreement) mechanism. HE has BHLR (BLAN Home Location Register) and authentication server (AuC). BHLR, a database for managing users, maintains subscribers profile and related information, and information relates to BVLR. AuC stores data that is required for authentication of each user, encryption and integrity, stores functions for generating master key (MK) that is distributed to each user and required other keys, and generates data that is required for authentication when a user requests authentication. Although BHLR and AuC are logically different, they may be implemented as physically same.
  • As mentioned above, BLAN is a network that wired and wireless networks coexist. Regarding the security of the BLAN, wireless communication part between UE and SN is essential. In security point of view, communication part between SN and HE is not substantially different from prior wired network, and communication part between RAP and BVLR in SN may be merely considered as extension of the communication part between SN and HE. Therefore, it may be presumed that safe channels are established in wired communication part of BLAN and safety of mutual authentication and all communication is ensured among each entity in wired communication part of BLAN.
  • The object of the mutual authentication may be the SN that is authorized authentication from US and HE. Communication network between UE and SN is the object of mutual authentication. The authentication is performed through message exchanges between a user and a network. After the authentication the user may trust to the connected network.
  • Secrecy may be divided into 2 types, one is user secrecy and the other is user-data secrecy. The user secrecy which uses temporal identification information instead of ID of the user is used for the protection of user location information and user related private information. The user-data secrecy is used for the protection of the data between UE and RAP. The user-data secrecy may be implemented by using block encryption algorithm after success completion of authentication (using authentication protocol).
  • Integrity is required to authenticate origin and content of a message. To investigate whether unintended or intended changes of message content exist, integrity check algorithm is implemented by using Message Authentication Code (MAC) algorithm.
  • Handover is performed for the continuity of service is wireless network. BLAN performs handover when an UE is moving from one RAP to another RAP. More frequent handovers might be expected than any other wireless network. For supporting frequent handovers, it is better to define a new authentication protocol, re-authentication protocol, which is different from AKA protocol.
  • However, it might be inefficient to apply same re-authentication protocol to all kinds of handovers. Therefore, handover type is identified before applying re-authentication protocol.
  • FIG. 3 illustrates two exemplary of handovers. Intra-BVLR handover is handover performed in one BVLR. That is, Intra-BVLR handover is the handover that is performed when UE is moving among RAPs of one BVLR. According to FIG. 3, the Intra-BVLR handover takes place when an UE is moving from RAP#1-1 to RAP#1-2 or from RAP#1-2 to RAP#1-1 (RAP#1-1 and RAP#1-2 are connected to the same BVLR#1).
  • Inter-BVLR handover means the handover between RAPs that is connected to different BVLR. In the Inter-BVLR handover case, authentication to a new BVLR is required. In this case, acquisition of information that is required for authentication from prior BVLR or new AKA process using BHLR are required. In the former case, a new secure channel is required. The new channel may used only when handover takes place. For the network efficiency, the latter authentication method that uses existing channel between BVLR. and BHLR is preferred. In the Inter-BVLR handover (BVLR changing handover), it is more efficient to perform another AKA process rather than to perform re-authentication process.
  • TABLE 2 shows characteristics of two handovers. TABLE 2
    Intra-BVLR handover Inter-BVLR handover
    Definition Movement among different RAPs in one BVLR Movement among RAPs that are connected different BVLR
    Possibility of taking place of handover High Low
    Authentication Protocol Re-authentication protocol BLAN-AKA
    Key update TK : not necessary TK : necessary
    SK : necessary SK : necessary
  • FIG. 4 illustrates structure of authentication protocol keys. The keys used in authentication protocol may be categorized into 3 types, MK, TK, SK. MK (master key), a secret key that BHLR and BSIM share beforehand, is a secret value for mutual authentication between a user and a network. This secret value is not disclosed to medium entities such as BVLR, RAP and ME. TK (temporary key), a temporary key originated from MK, is used to re-authentication in handover, etc. TK is generated by BHLR and transmitted to BVLR in AKA process. TK is a secret key that BSIM and BVLR share. SK (session key), a product of success authentication, is a key that is used to protect all traffics of wireless communication that uses binary CDMA.
  • AKA is a process for performing mutual authentication and key confirmation between a user and a network. AKA process should be performed for ensuring integrity and security of traffics.
  • FIG. 5 is a diagram which briefly shows BLAN-AKA process.
  • Steps:
    1. 1. SN transmits terminal authentication request message (identity request) to UE.
      Then, RAP only relays communications between UE and BVLR until session key (SK) is received from BVLR.
    2. 2. After receiving terminal authentication request message (identity request message), UE transmits terminal authentication response message (identity response message) to SN. The terminal authentication response message (identity response message) comprises PID (Permanent ID: permanent user ID) or TID (Temporary ID: Temporary user ID). PID is permanent identification of a user which is registered to HE by BSIM. TID is temporary identification that is received from mutually authenticated SN (particularly BVLR) through former AKA process. TID is used to protect secrecy of user location by hiding PID.
    3. 3. BVLR transmits PID received from UE to BHLR to acquire user data that is necessary for AKA process. If BVLR received TID, BVLR finds PID that matches to the received TID and transmits the PID to BHLR. If BVLR could not find PID that matches to the received TID, BVLR requests transmission of PID to UE and return to step 2. After receiving PID, BHLR generates random number 'HNonce' that corresponds to BHLR and calculates TK (temporary key) using KDF (Key Derivation Function) and XRES using MAC (Message Authentication Code). Then, BHLR transmits HNonce, TK, XRES, and counter to BVLR. The counter is similar to SQN in 3GPP. TK = KDF MK HNonce counter XRES = MAC MK HNonce counter
      Figure imgb0001
    4. 4. After receiving necessary data in step 3, BVLR authenticates the user. That is, BVLR authorized by BHLR authenticates the user using BLAN-AKA protocol. For the user authentication, BVLR generates a random number VNonce that corresponds to itself (BVLR) and calculates MAC-N by using the VNonce and TK. The user authenticates networks, that is, SN and HE by using MAC-N. BVLR transmits HNonce, VNonce, MAC-N and counter to UE by using AKA request message. MAC - N = MAC TK VNonce counter
      Figure imgb0002
    5. 5. UE authenticates the network by confirming MAC-N. If UE fails to authenticate the network, UE transmits authentication denial message to the network and terminates the connection. If UE successfully authenticates the network, UE confirms whether the received counter is within allowable range. If the counter is not within the allowable range, UE transmits a resynchronization request message for the resynchronization of the counter to BVLR, and then BVLR notifies the reception of the resynchronization request message to BHLR. BHLR updates the counter through checking the integrity of the message and may start a new AKA process. If the counter is within the allowable range, BSIM updates its own counter and generates a session key SK using VNonoce. BSIM calculates RES for the authentication of itself and transmits the RES to BVLR using AKA response message. SK = KDF TK VNonce counter RES = MAC MK HNonce counter
      Figure imgb0003
    6. 6. BVLR authenticates the user by confirming whether XRES and RES are identical. If BVLR successfully authenticates the user, BVLR generates SK using VNonce and TK, and transmits the SK to RAP. BVLR also transmits ANonce which is used in key confirmation process when BVLR transmits SK. Because ANonce is also used in re-authentication process, it is more efficient that BVLR generates ANonce and transmits it to RAP rather than RAP generates ANonce. BSIM of UE transmits SK to ME.
    7. 7. UE and RAP perform key confirmation process to confirm whether the SK that UE received and the SK that RAP received are identical with each other. It is preferred that the key confirmation process be performed using security algorithm for protecting traffics to be transmitted or received. FIG. 6 illustrates the key confirmation process of BLAN-AKA. MAC 1 = mac SK ANonce MAC 2 = mac SK , ANonce + 1
      Figure imgb0004
  • After successful completion of BLAN-AKA, BVLR and UE respectively stores TK and ANonce that are shared during AKA process for potential re-authentication. BVLR notifies successful completion of AKA process to BHLR, and then BHLR updates the counter.
  • When frequent handovers take place, re-authentication may reduce overhead so as to enable quick handover. Re-authentication may be performed using secret value that is shared by BSIM and BVLR. TK in BLAN-AKA protocol is one example of the secret value. TK may be updated through AKA process, authentication may be performed using TK when a handover between RAPs of one BVLR takes place.
  • FIG. 7 illustrates re-authentication process when intra-BVLR handover takes place when RAP#1-1 and RAP#1-2 are connected to the same BVLR, BVLR#1 and UE moeves from RAP41-1 to RAP#1-2. Alike AKA process RAP receives SK' from BVLR and relays communications between UE and BVLR.
  • Steps:
    1. 1. UE transmits TID (temporary ID) to BVLR for re-authentication when Intra-handover takes place.
    2. 2. BVLR searches PID that corresponds to TID, generates a new session key SK' by using TK and ANonce that are stored during AKA process, and transmits newly generated ANonce' to UE. In comparison with AKA process, MAC-S is similar to MAC1 that are used in key confirmation process. Only SK' and ANonce' are used instead of SK and ANonce. SKʹ = KDF TF ANonce
      Figure imgb0005
      MAC - S = MAC SKʹ ANonceʹ
      Figure imgb0006
    3. 3. Alike BVLR, UE generates SK' by using TK and ANonce that are stored during former AKA process and ANonce' received from BVLR, and proves MAC-S. If MAC-S is proven to be right, UE calculates MAC-U and transmits the calculated MAC-U to BVLR as a response. MAC - U = MAC SKʹ , ANonceʹ + 1
      Figure imgb0007
    4. 4. If BVLR successfully has proven the received MAC-U, BVLR transmits the encrypted value which is encrypted ANonce' encrypted by SK' to UE. If reallocation of TID is necessary, TIDnew, a new TID vale, is encrypted and transmitted, too.
      Followings are comparison between re-authentication and AKA process.
      AKA process uses formula 7 and re-authentication process uses formula 8. SK = KDF TK VNonce counter MAC 1 = mac SK ANonce MAC 2 = mac SK , ANonce + 1
      Figure imgb0008
      SKʹ = KDF TK ANonce MAC - S = MAC SKʹ ANonceʹ MAC - U = MAC SKʹ , ANonceʹ + 1
      Figure imgb0009
  • In re-authentication, it is obvious that ANonce is used instead of VNonce and ANonce' instead of ANonce. More specifically, Nonce used in the key confirmation process in AKA process is used to key derivation in later re-authentication. After the completion of re-authentication, ANonce' will be used to generate a new session key in next re-authentication.
  • Therefore, UE and BVLR should update their own ANonce to ANonce' respectively after the completion of re-authentication.
  • TABLE 3 shows comparison results between BLAN-AKA and re-authentication protocol. TABLE 3
    BLAN-AKA Re-authentication
    Number of Message transmission 12(wireless transmission 5) 8(wireless transmission 4)
    Number of algorithm calculation MAC/mac 8 4
    KDF 4 2
  • The number of message transmission counted after UE starts to transmit PID or TID is 12, because BLAN-AKA process further notifies the completion of authentication to BHLR after the completion of authentication. The obvious reductions of message transmission number and calculation number in re-authentication protocol are due to the characteristic of re-authentication protocol that exclusion of BHLR and simultaneous performance of authentication and key exchange. In re-authentication, key confirmation process is unnecessary because the session key SK' is proven through authentication.
  • Unlike WLAN that performs terminal authentication, BLAN performs authentication that is similar to user authentication by using BSIM that is similar to USIM. This means the enhancement of terminal usage efficiency, and strong protection of individual privacy.
  • In BLAN re-authentication protocol, BSIM and BVLR may generate session key SK' that will be used in next re-authentication in advance by using ANonce and TK that are used in former authentication. Therefore, BLAN re-authentication protocol supports faster authentication and BLAN using BLAN re-authentication protocol may efficiently handle frequent handovers.
  • In BLAN-AKA process, the possibility of resynchronization is very low, because BHLR transmits only one authentication data according to the requests of BVLRs that are located in proximity to each other and BSIM and BHLR perform updates only after the completion of successful BLAN-AKA process.
  • A number of examples have been described above. Nevertheless, it will be understood that various modifications may be made. For example, suitable results may be achieved if the described techniques are performed in a different order and/or if components in a described system, architecture, device, or circuit are combined in a different manner and/or replaced or supplemented by other components or their equivalents. Accordingly, other implementations are within the scope of the following claims.

Claims (11)

  1. A method for authenticating a key in a system comprised of a user terminal that comprises a master key for authentication, a serving network (SN) that comprises a wireless access point (RAP) and a visitor location register (VLR), and a home network that comprises an authentication server and a home location register (BHLR), the method comprising the steps of:
    transmitting terminal authentication response message that comprises identification information of the user terminal after receiving terminal authentication request message from the wireless access point;
    receiving user authentication request message that comprises at least two random numbers and a code information for message authentication from the wireless access point; and
    transmitting user authentication response message that comprises a first information generated by using at least one random number of the received random numbers, the code information and the master key.
  2. The method of claim 1, wherein the identification information is one of permanent identification information or temporary identification information, and the temporary identification information is transmitted from the visitor location register (VLR).
  3. The method of claim 2, wherein the random numbers are a first random number that is generated by home location register and a second random number that is generated by visitor location register.
  4. The method of claim 3, wherein the user terminal generates a temporary key by using the master key and the first random number, and generates a session key by using the temporary key and at least one random number of the received random numbers.
  5. The method of claim 1, wherein the user terminal and the serving network perform communications by using binary CDMA.
  6. A method for authenticating a key in a system comprised of a user terminal that comprises a master key for authentication, a serving network (SN) that comprises a wireless access point (RAP) and a visitor location register (VLR), and a home network that comprises an authentication server and a home location register (HLR), the method comprising the steps of:
    transmitting terminal authentication request message to the user terminal;
    receiving terminal authentication response message that comprises an identification information of the user terminal from the user terminal;
    transmitting authentication data request message that comprises the received identification information to the home network;
    receiving authentication data response message that comprises a first random number, a temporary key and a first information from the home network; and
    transmitting user authentication request message that comprises the first random number, a second random number and a code information for message authentication to the user terminal.
  7. The method of claim 6, wherein the identification information of the user terminal is one of permanent identification information or temporary identification information, and the temporary identification information is transmitted from the visitor location register (VLR).
  8. The method of claim 7, wherein the random numbers are a first random number that is generated by home location register and a second random number that is generated by visitor location register.
  9. The method of claim 8, wherein the code information for message authentication is generated by using the second random number and the temporary key.
  10. The method of claim 8, wherein the first information is generated by home network using the master key and the first random number, and the user authentication response message comprises a second information that is generated by the user terminal using the master key and the first random number.
  11. The method of claim 10, wherein the visitor location register generates a third random number for re-authentication of a key.
EP10841076A 2010-01-04 2010-01-14 Key authentication method for binary cdma Withdrawn EP2523486A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR1020100000176A KR101038096B1 (en) 2010-01-04 2010-01-04 Secure key authentication method for binary cdma network
PCT/KR2010/000220 WO2011081242A1 (en) 2010-01-04 2010-01-14 Key authentication method for binary cdma

Publications (1)

Publication Number Publication Date
EP2523486A1 true EP2523486A1 (en) 2012-11-14

Family

ID=44225404

Family Applications (1)

Application Number Title Priority Date Filing Date
EP10841076A Withdrawn EP2523486A1 (en) 2010-01-04 2010-01-14 Key authentication method for binary cdma

Country Status (5)

Country Link
US (1) US20110167270A1 (en)
EP (1) EP2523486A1 (en)
KR (1) KR101038096B1 (en)
CN (1) CN102823282B (en)
WO (1) WO2011081242A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104768153A (en) * 2014-01-02 2015-07-08 海尔集团公司 Method for sending and receiving network configuration information, and wifi terminal thereof

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP6113079B2 (en) * 2011-01-20 2017-04-12 コーニンクレッカ フィリップス エヌ ヴェKoninklijke Philips N.V. Cognitive radio device authentication and authorization
CN103597520B (en) * 2011-04-13 2016-12-07 诺基亚技术有限公司 The ticketing service method and system of identity-based
US20130291083A1 (en) * 2011-05-31 2013-10-31 Feitian Technologiesco., Ltd Wireless smart key device and signing method thereof
TWI428031B (en) * 2011-10-06 2014-02-21 Ind Tech Res Inst Authentication method and apparatus for user equipment and lipa network eneities
GB2536509A (en) * 2015-05-06 2016-09-21 Vodafone Ip Licensing Ltd Efficient cellular network security configuration
KR102134302B1 (en) 2016-01-29 2020-07-15 텐센트 테크놀로지(센젠) 컴퍼니 리미티드 Wireless network access method and apparatus, and storage medium
US10469516B2 (en) * 2016-04-28 2019-11-05 Qualcomm Incorporated Techniques for associating measurement data acquired at a wireless communication device with current values of time and location obtained by a user equipment and acknowledged by the wireless communication device
CN107529160B (en) * 2016-06-21 2022-07-15 中兴通讯股份有限公司 VoWiFi network access method and system, terminal and wireless access point equipment
AU2017408843A1 (en) * 2017-04-11 2019-03-14 Huawei Technologies Co., Ltd. Network authentication method, device, and system
EP3656145B1 (en) * 2017-07-17 2023-09-06 Sonova AG Encrypted audio streaming
FR3069998A1 (en) * 2017-08-03 2019-02-08 Orange METHOD OF OBTAINING A PROFILE OF ACCESS TO A COMMUNICATION NETWORK BY A SECONDARY TERMINAL VIA A MAIN TERMINAL
US11443016B2 (en) * 2018-11-09 2022-09-13 Sony Corporation Pre-key with authentication using logical combinations of pre-key bits with other information
US20210400475A1 (en) * 2018-11-12 2021-12-23 Telefonaktiebolaget Lm Ericsson (Publ) Authentication of a Communications Device
US20220201597A1 (en) * 2019-03-29 2022-06-23 Samsung Electronics Co., Ltd. Method for edge computing service and electronic device therefor
KR20200115333A (en) 2019-03-29 2020-10-07 삼성전자주식회사 Apparatus and method for providing a service of edge comupting in a wireless commu nication system
CN112198805B (en) * 2019-07-08 2024-06-14 阿里巴巴集团控股有限公司 Device control method, device, system, computing device and storage medium

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FI111208B (en) * 2000-06-30 2003-06-13 Nokia Corp Arrangement of data encryption in a wireless telecommunication system
JP2004208073A (en) 2002-12-25 2004-07-22 Sony Corp Radio communication system
KR100581590B1 (en) * 2003-06-27 2006-05-22 주식회사 케이티 Two-factor authenticated key exchange method and authentication method using the same, and recording medium storing program including the same
KR100578375B1 (en) * 2004-03-09 2006-05-11 주식회사 케이티프리텔 The method and system for authenticating user terminal in HRPD network
CN101005489A (en) * 2006-01-20 2007-07-25 华为技术有限公司 Method for protecting mobile communication system network safety
CN101026866A (en) * 2006-02-20 2007-08-29 华为技术有限公司 AK context cache method for wireless communication system
KR100837817B1 (en) * 2006-06-30 2008-06-13 주식회사 케이티 System and Method of Network/Service Connection Management for linkage between Network Connection and Application Service
US8948395B2 (en) * 2006-08-24 2015-02-03 Qualcomm Incorporated Systems and methods for key management for wireless communications systems
KR101002799B1 (en) * 2007-03-21 2010-12-21 삼성전자주식회사 mobile telecommunication network and method for authentication of mobile node in mobile telecommunication network
US8112065B2 (en) * 2007-07-26 2012-02-07 Sungkyunkwan University Foundation For Corporate Collaboration Mobile authentication through strengthened mutual authentication and handover security
US8041335B2 (en) * 2008-04-18 2011-10-18 Kineto Wireless, Inc. Method and apparatus for routing of emergency services for unauthorized user equipment in a home Node B system
KR20090126166A (en) * 2008-06-03 2009-12-08 엘지전자 주식회사 Method of generating and updating traffic encryption key

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2011081242A1 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104768153A (en) * 2014-01-02 2015-07-08 海尔集团公司 Method for sending and receiving network configuration information, and wifi terminal thereof
CN104768153B (en) * 2014-01-02 2018-09-25 海尔集团公司 Send, receive the method and its wifi terminals of network configuration information

Also Published As

Publication number Publication date
CN102823282B (en) 2015-07-22
CN102823282A (en) 2012-12-12
KR101038096B1 (en) 2011-06-01
US20110167270A1 (en) 2011-07-07
WO2011081242A1 (en) 2011-07-07

Similar Documents

Publication Publication Date Title
EP2523486A1 (en) Key authentication method for binary cdma
US7356145B2 (en) Arranging data ciphering in a wireless telecommunication system
US8627092B2 (en) Asymmetric cryptography for wireless systems
KR100625503B1 (en) Method for updating secret shared data in a wireless communication system
CN101083839B (en) Cipher key processing method for switching among different mobile access systems
Mun et al. 3G-WLAN interworking: security analysis and new authentication and key agreement based on EAP-AKA
CN108880813B (en) Method and device for realizing attachment process
Dantu et al. EAP methods for wireless networks
CN101228766A (en) Exchange of key material
CN101102600A (en) Secret key processing method for switching between different mobile access systems
CN101405987A (en) Asymmetric cryptography for wireless systems
CN101483870A (en) Cross-platform mobile communication security system implementing method
Ahmadian et al. New attacks on UMTS network access
Sharma et al. Exposing the security weaknesses of fifth generation handover communication
Tseng USIM-based EAP-TLS authentication protocol for wireless local area networks
Saxena et al. NS-AKA: An improved and efficient AKA protocol for 3G (UMTS) networks
KR100330418B1 (en) Authentication Method in Mobile Communication Environment
Sher et al. Network access security management (NASM) model for next generation mobile telecommunication networks
Huang et al. Provable secure AKA scheme with reliable key delegation in UMTS
Singh et al. Cell phone cloning: a perspective on gsm security
Parne et al. SEACE: Security enhanced and computationally efficient AKA protocol for UMTS networks
Safdar et al. Limitations of existing wireless networks authentication and key management techniques for MANETs
Vizvari et al. Authentication and authorizing scheme based on umts aka protocol for cognitive radio networks
Fathi et al. Secure AAA and mobility for nested mobile networks
JEONG et al. Three Party Mutual Authentication Schemes for the Virtual Home Environment in the Next Generation Mobile Network

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20120709

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK SM TR

DAX Request for extension of the european patent (deleted)
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20160802